Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
As agencies work to modernize their IT systems and improve cybersecurity under congressional and Trump administration mandate, there is much they can do to ensure better mobile security.
In a digital world that challenges personal privacy, a system is in development for protecting connected devices.
The Homeland Security Department's Science and Technology directorate is publishing the latest deep dive into mobile device security and how to make sure federal agencies can use these essentially consumer devices safely. Vincent Sritapan, mobile security program director in the directorate, shares the details on Federal Drive with Tom Temin.
The Health and Human Services Department will soon achieve initial operating capability on the Health Cybersecurity and Communications Integration Center (HCCIC). It's modeled after the Homeland Security Department's own NCCIC, a public-private partnership that disseminates information and best practices on cyber risks.
Mobile is critical infrastructure for government agencies. See what a panel of six federal CIOs, CISOs, and CTOs say is the solution to securing mobile.
Nathan Kielman, tactical mobility lead in the weapons division at the Naval Air Warfare Center, has an idea that takes a new approach to the issue of mobility vs. slow defense acquisition. Why not reclassify mobile technology, treating it like less expensive equipment meant to be used up and disposed?
There’s no doubt about it – the federal government has gone mobile. Driven by both policy and the compelling nature of mobile computing, smartphones and tablets have become daily tools at all levels of government. No longer just for email and phone calls, in the hands of line and management employees, mobile devices also carry enterprise applications and collaboration tools.
Rebecca Cowen-Hirsh, with Inmarsat explains how her company can help federal agencies set up secure satellite communications around the world. August 25, 2015
The Pentagon led the way for the rest of the government by implementing two-factor authentication across many of its systems. But plenty of important IT infrastructure still relies on a "reckless" system that depends on passwords alone for authentication.
The number one destination for data stolen off wireless networks isn't China or Russia. It's actually the United States, according to research from Lookout Mobile Security. But they say that makes sense because of how mobile threats travel across a network. Bob Stevens is a vice president of Lookout Mobile Security and leader of their federal division. On In Depth with Francis Rose, he detailed the latest mobile security trends that can keep your agency ahead of the curve.
Tony Harmon, CEO of CareDirector USA, wil discuss the interaction between technology and managed services, healthcare IT, and the Affordable Care Act. November 5, 2013
Kim Hancher, the chief information officer at the Equal Employment Opportunity Commission, will hsare her ideas on mobile device management August 6, 2013
Don Bruns, managing director at Navigation Arts, will discuss best practices for designing web apps. January 15, 2013
Gigi Schumm, vice president and general manager Public Sector of Symantec, talks about computer security. December 18, 2012